default search action
Karine Heydemann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 179-204 (2024) - [i17]Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. IACR Cryptol. ePrint Arch. 2024: 247 (2024) - 2023
- [j17]Lorenzo Casalino, Nicolas Belleville, Damien Couroussé, Karine Heydemann:
A Tale of Resilience: On the Practical Security of Masked Software Implementations. IEEE Access 11: 84651-84669 (2023) - [j16]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4555-4568 (2023) - [j15]Quentin L. Meunier, Etienne Pons, Karine Heydemann:
LeakageVerif: Efficient and Scalable Formal Verification of Leakage in Symbolic Expressions. IEEE Trans. Software Eng. 49(6): 3359-3375 (2023) - [c24]Andersson Calle Viera, Alexandre Berzati, Karine Heydemann:
Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification. CARDIS 2023: 62-83 - [c23]Antoine Gicquel, Damien Hardy, Karine Heydemann, Erven Rohou:
SAMVA: Static Analysis for Multi-fault Attack Paths Determination. COSADE 2023: 3-22 - [c22]Simon Tollec, Mihail Asavoae, Damien Couroussé, Karine Heydemann, Mathieu Jan:
μARCHIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD 2023: 101-109 - [i16]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks. CoRR abs/2309.02255 (2023) - [i15]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2023: 1323 (2023) - [i14]Andersson Calle Viera, Alexandre Berzati, Karine Heydemann:
Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification. IACR Cryptol. ePrint Arch. 2023: 1796 (2023) - 2022
- [j14]Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier:
ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 3733-3744 (2022) - [c21]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks. DATE 2022: 556-559 - [c20]Simon Tollec, Mihail Asavoae, Damien Couroussé, Karine Heydemann, Mathieu Jan:
Exploration of Fault Effects on Formal RISC-V Microarchitecture Models. FDTC 2022: 73-83 - [i13]Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier:
Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification. IACR Cryptol. ePrint Arch. 2022: 467 (2022) - 2021
- [j13]Karine Heydemann, Letitia Li:
Editorial about PROOFS 2019. J. Cryptogr. Eng. 11(2): 103-104 (2021) - [j12]Karine Heydemann, Letitia Li:
Correction to: Editorial about PROOFS 2019. J. Cryptogr. Eng. 11(2): 197 (2021) - [j11]Son Tuan Vu, Albert Cohen, Arnaud de Grandmaison, Christophe Guillon, Karine Heydemann:
Reconciling optimization with secure compilation. Proc. ACM Program. Lang. 5(OOPSLA): 1-30 (2021) - [i12]Son Tuan Vu, Albert Cohen, Karine Heydemann, Arnaud de Grandmaison, Christophe Guillon:
Secure Optimization Through Opaque Observations. CoRR abs/2101.06039 (2021) - [i11]Quentin L. Meunier, Etienne Pons, Karine Heydemann:
LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions. IACR Cryptol. ePrint Arch. 2021: 1468 (2021) - 2020
- [j10]Nicolas Belleville, Damien Couroussé, Karine Heydemann, Quentin L. Meunier, Inès Ben El Ouahma:
Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3774-3786 (2020) - [c19]Son Tuan Vu, Karine Heydemann, Arnaud de Grandmaison, Albert Cohen:
Secure delivery of program properties through optimizing compilation. CC 2020: 14-26 - [c18]Pantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont:
Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks. COSADE 2020: 221-253 - [c17]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert, Baptiste Pecatte:
Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. COSADE 2020: 254-274 - [i10]Pantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont:
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks. IACR Cryptol. ePrint Arch. 2020: 466 (2020)
2010 – 2019
- 2019
- [j9]Karine Heydemann, Jean-François Lalande, Pascal Berthomé:
Formally verified software countermeasures for control-flow integrity of smart card C code. Comput. Secur. 85: 202-224 (2019) - [j8]Inès Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, Emmanuelle Encrenaz:
Side-channel robustness analysis of masked assembly codes using a symbolic approach. J. Cryptogr. Eng. 9(3): 231-242 (2019) - [j7]Nicolas Belleville, Damien Couroussé, Karine Heydemann, Henri-Pierre Charles:
Automated Software Protection for the Masses Against Side-Channel Attacks. ACM Trans. Archit. Code Optim. 15(4): 47:1-47:27 (2019) - [c16]Julien Proy, Karine Heydemann, Alexandre Berzati, Fabien Majéric, Albert Cohen:
A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective. ARES 2019: 7:1-7:10 - [e1]Karine Heydemann, Ulrich Kühne, Letitia Li:
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, PROOFS 2019, colocated with CHES 2018, Atlanta, GA, USA, August 24, 2019. Kalpa Publications in Computing 11, EasyChair 2019 [contents] - [i9]Julien Proy, Karine Heydemann, Fabien Majéric, Albert Cohen, Alexandre Berzati:
Studying EM Pulse Effects on Superscalar Microarchitectures at ISA Level. CoRR abs/1903.02623 (2019) - [i8]Pantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont:
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures. IACR Cryptol. ePrint Arch. 2019: 756 (2019) - 2018
- [c15]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert:
CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity. DSD 2018: 529-536 - [c14]Damien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann:
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. CS2@HiPEAC 2018: 17-18 - [p1]Nicolas Belleville, Karine Heydemann, Damien Couroussé, Thierno Barry, Bruno Robisson, Abderrahmane Seriai, Henri-Pierre Charles:
Automatic Application of Software Countermeasures Against Physical Attacks. Cyber-Physical Systems Security 2018: 135-155 - [i7]Nicolas Belleville, Damien Couroussé, Karine Heydemann, Henri-Pierre Charles:
Automated software protection for the masses against side-channel attacks. IACR Cryptol. ePrint Arch. 2018: 1197 (2018) - 2017
- [j6]Julien Proy, Karine Heydemann, Alexandre Berzati, Albert Cohen:
Compiler-Assisted Loop Hardening Against Fault Attacks. ACM Trans. Archit. Code Optim. 14(4): 36:1-36:25 (2017) - [c13]Inès Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, Emmanuelle Encrenaz:
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes. PROOFS 2017: 17-32 - 2016
- [c12]Andi Drebes, Antoniu Pop, Karine Heydemann, Albert Cohen, Nathalie Drach:
Scalable Task Parallelism for NUMA: A Uniform Abstraction for Coordinated Scheduling and Memory Management. PACT 2016: 125-137 - [c11]Andi Drebes, Antoniu Pop, Karine Heydemann, Albert Cohen:
Interactive visualization of cross-layer performance anomalies in dynamic task-parallel applications and systems. ISPASS 2016: 274-283 - [c10]Andi Drebes, Jean-Baptiste Bréjon, Antoniu Pop, Karine Heydemann, Albert Cohen:
Language-Centric Performance Analysis of OpenMP Programs with Aftermath. IWOMP 2016: 237-250 - [c9]Andi Drebes, Antoniu Pop, Karine Heydemann, Nathalie Drach, Albert Cohen:
NUMA-aware scheduling and memory allocation for data-flow task-parallel applications. PPoPP 2016: 44:1-44:2 - 2015
- [c8]Lucien Goubet, Karine Heydemann, Emmanuelle Encrenaz, Ronald De Keulenaer:
Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification. CARDIS 2015: 177-192 - 2014
- [j5]Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3): 145-156 (2014) - [j4]Andi Drebes, Karine Heydemann, Nathalie Drach, Antoniu Pop, Albert Cohen:
Topology-Aware and Dependence-Aware Scheduling and Memory Allocation for Task-Parallel Languages. ACM Trans. Archit. Code Optim. 11(3): 30:1-30:25 (2014) - [c7]Jean-François Lalande, Karine Heydemann, Pascal Berthomé:
Software Countermeasures for Control Flow Integrity of Smart Card C Codes. ESORICS (2) 2014: 200-218 - [c6]Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz:
Experimental evaluation of two software countermeasures against fault attacks. HOST 2014: 112-117 - [i6]Nicolas Moro, Amine Dehbaoui, Karine Heydemann, Bruno Robisson, Emmanuelle Encrenaz:
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. CoRR abs/1402.6421 (2014) - [i5]Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. CoRR abs/1402.6461 (2014) - [i4]Andi Drebes, Karine Heydemann, Antoniu Pop, Albert Cohen, Nathalie Drach:
Automatic Detection of Performance Anomalies in Task-Parallel Programs. CoRR abs/1405.2916 (2014) - [i3]Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz:
Experimental evaluation of two software countermeasures against fault attacks. CoRR abs/1407.6019 (2014) - 2013
- [c5]Nicolas Moro, Amine Dehbaoui, Karine Heydemann, Bruno Robisson, Emmanuelle Encrenaz:
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller. FDTC 2013: 77-88 - [i2]Karine Heydemann, Nicolas Moro, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. IACR Cryptol. ePrint Arch. 2013: 679 (2013) - 2012
- [c4]Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande:
High Level Model of Control Flow Attacks for Smart Card Functional Security. ARES 2012: 224-229 - 2011
- [j3]Haluk Ozaktas, Karine Heydemann:
Compression de code pour processeurs haute performance. Tech. Sci. Informatiques 30(9): 1035-1059 (2011) - [c3]Oussama Gamoudi, Nathalie Drach, Karine Heydemann:
Using Runtime Activity to Dynamically Filter Out Inefficient Data Prefetches. Euro-Par (1) 2011: 338-350 - 2010
- [c2]Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande:
Attack model for verification of interval security properties for smart card C codes. PLAS 2010: 2 - [i1]Hugues Cassé, Karine Heydemann, Haluk Ozaktas, Jonathan Ponroy, Christine Rochange, Olivier Zendra:
A framework to experiment optimizations for real-time and embedded software. CoRR abs/1011.6031 (2010)
2000 – 2009
- 2008
- [j2]Alexandre Coveliers, Karine Heydemann, Nathalie Drach:
Étude de la sensibilité aux jeux de données de la compilation itérative. Tech. Sci. Informatiques 27(6): 757-777 (2008) - 2006
- [j1]Karine Heydemann, François Bodin, Peter M. W. Knijnenburg, Laurent Morin:
UFS: a global trade-off strategy for loop unrolling for VLIW architectures. Concurr. Comput. Pract. Exp. 18(11): 1413-1434 (2006) - 2005
- [c1]Karine Heydemann, François Bodin, Henri-Pierre Charles:
A Software-only Compression System for Trading-off Performance and Code Size. SCOPES 2005: 27-36
Coauthor Index
aka: Emmanuelle Encrenaz
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint